• 제목/요약/키워드: use of computer

검색결과 10,224건 처리시간 0.04초

모바일 웹 브라우징 서비스의 사용 의도에 영향을 미치는 요인 : 자기효능감과 사회적 영향 (Determinants of User Intentions to Use Mobile Web Browsing Service: Self Efficacy and Social Influences)

  • 김경규;류성렬;김문오;김효진
    • Journal of Information Technology Applications and Management
    • /
    • 제16권1호
    • /
    • pp.149-168
    • /
    • 2009
  • This paper aims to empirically examine how personal characteristics and social influence affect user acceptance of mobile web browsing service. To examine the intention to use mobile web browsing service, we applied the Technology Acceptance Model (TAM) which has been widely used to explain and predict the IT acceptance to this study. This research also includes personal characteristics such as computer self-efficacy, mobile self-efficacy, and personal innovativeness in IT and social influences such as subjective norms, image, and visibility as the external variables of the TAM. The results indicate that computer self-efficacy do not directly influence ease of use, but indirectly through mobile self-efficacy. And the results indicate that mobile self-efficacy and personal innovativeness in IT have direct effects on ease of use. Empirical results also show that subjective norms and image affect usefulness. Additional theoretical and practical implications of these findings are also discussed in the paper.

  • PDF

Masked Face Recognition via a Combined SIFT and DLBP Features Trained in CNN Model

  • Aljarallah, Nahla Fahad;Uliyan, Diaa Mohammed
    • International Journal of Computer Science & Network Security
    • /
    • 제22권6호
    • /
    • pp.319-331
    • /
    • 2022
  • The latest global COVID-19 pandemic has made the use of facial masks an important aspect of our lives. People are advised to cover their faces in public spaces to discourage illness from spreading. Using these face masks posed a significant concern about the exactness of the face identification method used to search and unlock telephones at the school/office. Many companies have already built the requisite data in-house to incorporate such a scheme, using face recognition as an authentication. Unfortunately, veiled faces hinder the detection and acknowledgment of these facial identity schemes and seek to invalidate the internal data collection. Biometric systems that use the face as authentication cause problems with detection or recognition (face or persons). In this research, a novel model has been developed to detect and recognize faces and persons for authentication using scale invariant features (SIFT) for the whole segmented face with an efficient local binary texture features (DLBP) in region of eyes in the masked face. The Fuzzy C means is utilized to segment the image. These mixed features are trained significantly in a convolution neural network (CNN) model. The main advantage of this model is that can detect and recognizing faces by assigning weights to the selected features aimed to grant or provoke permissions with high accuracy.

SOME INTEGRATIONS ON NULL HYPERSURFACES IN LORENTZIAN MANIFOLDS

  • Massamba, Fortune;Ssekajja, Samuel
    • 대한수학회보
    • /
    • 제56권1호
    • /
    • pp.229-243
    • /
    • 2019
  • We use the so-called pseudoinversion of degenerate metrics technique on foliated compact null hypersurface, $M^{n+1}$, in Lorentzian manifold ${\overline{M}}^{n+2}$, to derive an integral formula involving the r-th order mean curvatures of its foliations, ${\mathcal{F}}^n$. We apply our formula to minimal foliations, showing that, under certain geometric conditions, they are isomorphic to n-dimensional spheres. We also use the formula to deduce expressions for total mean curvatures of such foliations.

FIRE DISASTER SIMULATION BASED ON PARTICLE SYSTEM

  • Shin, Zen-Chung;Chen, Yean-Liang
    • 한국방송∙미디어공학회:학술대회논문집
    • /
    • 한국방송공학회 1999년도 KOBA 방송기술 워크샵 KOBA Broadcasting Technology Workshop
    • /
    • pp.195-200
    • /
    • 1999
  • In computer graphics, the modeling and simulation of flames is a challenging problem. In this paper, we propose an approach for the simulation of a fire disaster. We use particle systems to describe the dynamic behavior fire. The illumination of dynamic flame is rendered by progressive radiosity algorithm.

Identifying literature-based significant genes and discovering novel drug indications on PPI network

  • Park, Minseok;Jang, Giup;Lee, Taekeon;Yoon, Youngmi
    • 한국컴퓨터정보학회논문지
    • /
    • 제22권3호
    • /
    • pp.131-138
    • /
    • 2017
  • New drug development is time-consuming and costly. Hence, it is necessary to repurpose old drugs for finding new indication. We suggest the way that repurposing old drug using massive literature data and biological network. We supposed a disease-drug relationship can be available if signal pathways of the relationship include significant genes identified in literature data. This research is composed of three steps-identifying significant gene using co-occurrence in literature; analyzing the shortest path on biological network; and scoring a relationship with comparison between the significant genes and the shortest paths. Based on literatures, we identify significant genes based on the co-occurrence frequency between a gene and disease. With the network that include weight as possibility of interaction between genes, we use shortest paths on the network as signal pathways. We perform comparing genes that identified as significant gene and included on signal pathways, calculating the scores and then identifying the candidate drugs. With this processes, we show the drugs having new possibility of drug repurposing and the use of our method as the new method of drug repurposing.

Some Uses of Computing in Caving

  • Dibben, Nigel
    • 동굴
    • /
    • 제4호
    • /
    • pp.59-66
    • /
    • 1996
  • This article is based upon a talk given at the 1983 National Caving Conference explaining the types of personal computers available, their main features and how they could be used in connection with caving. There may be two groups of readers particularly interested in this subject, those covers with use of a computer who want some ideas on using it and others who want to know if getting a computer to use in connection with caving might be worth their while.

  • PDF

Utilizing OpenFlow and sFlow to Detect and Mitigate SYN Flooding Attack

  • Nugraha, Muhammad;Paramita, Isyana;Musa, Ardiansyah;Choi, Deokjai;Cho, Buseung
    • 한국멀티미디어학회논문지
    • /
    • 제17권8호
    • /
    • pp.988-994
    • /
    • 2014
  • Software Defined Network (SDN) is a new technology in computer network area which enables user to centralize control plane. The security issue is important in computer network to protect system from attackers. SYN flooding attack is one of Distributed Denial of Service attack methods which are popular to degrade availability of targeted service on Internet. There are many methods to protect system from attackers, i.e. firewall and IDS. Even though firewall is designed to protect network system, but it cannot mitigate DDoS attack well because it is not designed to do so. To improve performance of DDOS mitigation we utilize another mechanism by using SDN technology such as OpenFlow and sFlow. The methodology of sFlow to detect attacker is by capturing and sum cumulative traffic from each agent to send to sFlow collector to analyze. When sFlow collector detect some traffics as attacker, OpenFlow controller will modify the rule in OpenFlow table to mitigate attacks by blocking attack traffic. Hence, by combining sum cumulative traffic use sFlow and blocking traffic use OpenFlow we can detect and mitigate SYN flooding attack quickly and cheaply.

特定地域의 大氣汚染 擴散모델 開發에 關한 硏究 (A Study on the Development of Air Pollution Dispersion Model for Personal Computer)

  • 송기유;임흥재;윤명희
    • 한국대기환경학회지
    • /
    • 제2권2호
    • /
    • pp.19-30
    • /
    • 1986
  • This study was performed to develop a long-term air pollution dispersion model based on CDM program for use in the personal computer. The model CDM.PC, developmented for use of this study, simplified the plum equation of point pollution source in a windy state and sindless state. We used the classified 8 class stability, 16 wind direction and 4 class wind speed for the computer input climatological data. The plum rise equation is applied for CONCAWE's equation above 2,000 Kcal/sec of the exhaust calorie and Moses-Carson's equation below 2,000Kcal/sec at windy state, and Brigg's equation at calm. The time required is 200 minutes for drawing the air pollution contour for treating ten stacks under the above-stated conditions. It is the weakness of using personal computer that the operation time is longer than a large-size computer. But it strength is that the personal computer is used widely. To compare the treatment results of CDM.PC with TCM, we comfirmed that the shape of $SO_2$ pollution contour is similar but the concentration distribution is quite different because of characteristics of each models. Estimated and measured $SO_2$ concentration were similar, namely, Cest/Cob ratio of CDM.PC and TCM were respectively $0.96 \pm 0.25 (mean\pmS.D)$ and $1.08\pm0.26$.

  • PDF

PC 이용과 놀이성(playfulness)의 관계에 대한 연구 (A Study on the Relationship between PC Use and Playfulness)

  • 백상용
    • Asia pacific journal of information systems
    • /
    • 제10권4호
    • /
    • pp.101-113
    • /
    • 2000
  • This study deals with the concept of Microcomputer Playfulness(MCP), Even though MCP was introduced recently in the MIS research, the concept is expected and empirically supported to be significant in explaining information technology adoption and usage. Based on the Technology Acceptance Model(TAM), this study presented a revised model to explain individual PC use and explored the role of MCP in PC use. The results showed that MCP has a direct influence on PC use rather than a mediator between Self-efficacy and PC use, and that MCP is a better predictor of PC use than Computer Anxiety.

  • PDF

CBAM 모형에 근거한 가정과 교사의 ICT 활용수업 평가 - 관심도와 실행 수준을 중심으로 - (Evaluation of ICT-Utilized Lessons on the based of CBAM model by Home Economics Teachers - on Concerns and Implementation -)

  • 채정현;황선경
    • 한국가정과교육학회지
    • /
    • 제14권2호
    • /
    • pp.37-52
    • /
    • 2002
  • This study was made on the concerns and implementation of the ICT(Inormation and Communication Technology)-utilized lesson by home economics teacher. The objective of this study is to investigate the stages of concern and the level of use of the ICT-utilized lesson by home economics teachers in Kyunggi Province through the concerns based adoption model(CBAM) and to provide assistance for ICT-utilizing lesson to be efficiently adopted to home economics. This study made selected 200 schools by random sampling among 233 middle schools which have two or more home economic teachers and 21 or more classes in Kyunggi Province which has a total of 395 middle schools and mail-surveyed on 400 home economics teachers by means of questionnaire. The stages of concern. the levels of use and the types of implementation were used as instruments in this survey. The results of this study on the stages of concern. the levels of use and the type of implementation of the ICT-utilized lesson by home economics teachers in Kyunggi Province were as following: First. the highest point of the concern of home economics teachers of ICT-utilized lesson was the stage of awareness. the second highest point was the stage of management. the 3rd stage. and the stage of information. the lst stage. Second. the highest level of implementation of ICT-utilized lesson by home economics teachers was the level of mechanical use. the 3rd stage(30.4%), which followed by the level of orientation. the 1st stage(22.5%). and the level of nonuse(16.7%). the level of rountine use. the 4th stage(13.7%) the level of integration. the 5th stage(11.8%). the level of preparation 2(3.9%). and the level of renewal. the 6th stage(1.0%) Third, information search was the most in the type of ICT-use and in the course of lesson CD-ROM was used the most.. During ICT-utilized lesson. most of teachers used computer one to two hours a week mainly in the lessons of clothing life and eating life. Home economics teachers took the most training of how to use word-processor(68.6%) during computer education. and 60 teachers(66.0%) gave positive response about the effect of computer education on teacher's learning. Finally. the biggest problem with ICT-use in the teacher's learning was the long preparation time for lesson. and problem with ICT-utilized lesson was the burden of time and effort spent to buy needed materials and to recompose the existing materials for the lesson. Therefore. so as to adopt ICT-utilized lesson efficiently into school it is needed that active promotion for the lesson should be made to teachers. training teachers to raise their ability to use computer and various kinds of software should be expanded. and school authorities' financial and administrative assistance should be given for the smooth proceeding of the lesson.

  • PDF